Listing all results (14182)

Lesson 3 - RSC merchandise

In this lesson learners will be given a partly completed spreadsheet which shows items of merchandise to be sold at the RSC Live event. Learners will research the kinds of merchandise available at events and some prices, and this information will be used to populate a financial model. They will complete...

Lesson 2 - The RSC Live event

In this lesson learners will be given a partly completed spreadsheet which represents seating for the live event of Rock Star Challenge. There are different seat prices for adults, students, and over 60s. Users will select seats from a drop-down list and formulae will be used...

Lesson 1 - Spreadsheets warm-up

In this lesson learners will revisit their spreadsheet skills, check their understanding of the layout of a spreadsheet, and refamiliarise themselves with formulae. The topic will be a television talent show, Rock Star Challenge. Viewers will be invited to phone in and vote for...

Spreadsheets Overview

This resource provides a unit overview for the Years 10 and 11 'Spreadsheets’ unit of work. It gives a clear overview of objectives to be covered within each session and a learning graph to show the range of skills being developed through this computing unit.

Lesson 7 - Being part of the solution: End-of-unit test and careers in cybersecurity

This lesson enables the learners to engage in a comprehensive end-of-unit assessment covering aspects from each of the preceding six lessons. In addition, it provides some inspiration for the learners to get involved with cybersecurity for themselves, for the benefit of their...

Lesson 6 - Where is the danger? How companies can test their own vulnerability

This lesson builds on the previous ones about the different types of automated and non-automated cybercrime. Learners will begin to understand how companies can and do test their own vulnerability to cybercrime.

This lesson is the sixth in a seven session teaching unit...

Lesson 5 - Fighting fire with fire: Network design as defence

This lesson builds on the previous one, which taught learners about the ways in which companies design software that discourages cybercrime and how they use software to avoid cybercrime. In this lesson, the learners will find out about ways to protect network systems from cybercrime. It leads on to...

Lesson 4 - Fighting fire with fire: Software design as defence

This lesson builds on the previous lesson, which taught learners about the ways in which companies test their own vulnerability. In this lesson, the learners discover ways to protect software systems all the way from design to access. It leads on to Lesson 5, in which the learner discovers how...

Lesson 3 - Be suspicious: Automated cybercrime

This lesson builds on the previous one, which was about non-automated cybercrime, to enable learners to distinguish between non-automated and automated cybercrime. Learners will begin to understand terms and techniques related to automated cybercrime and the vulnerabilities of a network or software that...

Lesson 2 - Be suspicious: Non-automated cybercrime

This lesson enables the learners to distinguish between non-automated and automated cybercrime. Most of the lesson focuses on social engineering and introduces the idea that humans are the weakest link in the security chain. The learners will learn how to recognise and categorise different types of...

Pages

View all publishers